- Main
- Computers - Security
- The Car Hacker’s Handbook: A Guide for...
The Car Hacker’s Handbook: A Guide for the Penetration Tester
Craig SmithAvez-vous aimé ce livre?
Quelle est la qualité du fichier téléchargé?
Veuillez télécharger le livre pour apprécier sa qualité
Quelle est la qualité des fichiers téléchargés?
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack.
The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.
Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to:
• Build an accurate threat model for your vehicle
• Reverse engineer the CAN bus to fake engine signals
• Exploit vulnerabilities in diagnostic and data-logging systems
• Hack the ECU and other firmware and embedded systems
• Feed exploits through infotainment and vehicle-to-vehicle communication systems
• Override factory settings with performance-tuning techniques
• Build physical and virtual test benches to try out exploits safely
If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.
The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.
Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to:
• Build an accurate threat model for your vehicle
• Reverse engineer the CAN bus to fake engine signals
• Exploit vulnerabilities in diagnostic and data-logging systems
• Hack the ECU and other firmware and embedded systems
• Feed exploits through infotainment and vehicle-to-vehicle communication systems
• Override factory settings with performance-tuning techniques
• Build physical and virtual test benches to try out exploits safely
If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.
Catégories:
Année:
2016
Edition:
1
Editeur::
No Starch Press
Langue:
english
Pages:
306
ISBN 10:
1593277032
ISBN 13:
9781593277031
Fichier:
PDF, 23.85 MB
Vos balises:
IPFS:
CID , CID Blake2b
english, 2016
Lire en ligne
- Télécharger
- pdf 23.85 MB Current page
- Checking other formats...
Vous souhaitez ajouter une librairie ? Contactez-nous à support@z-lib.do
Le fichier sera envoyé à votre adresse de courriel dans 1 à 5 minutes.
Dans 1-5 minutes, le fichier sera delivré à votre compte Telegram.
Note : Assurez-vous que vous avez lié votre compte au bot Telegram de Z-Library.
Dans 1-5 minutes, le fichier sera delivré à votre appareil Kindle.
Remarque: vous devez valider chaque livre avant de l'envoyer à Kindle. Veuillez vérifier votre messagerie pour voir le mail avec la confirmation par Amazon Kindle Support.
La conversion en est effectuée
La conversion en a échoué
Avantages du statut Premium
- Envoyez aux e-lecteurs
- Limite de téléchargement augmentée
- Convertissez des fichiers
- Plus de résultats de recherche
- Autres avantages